CompTIA CySA+ CS0-003 Practice Question
During the investigation of a security incident, an analyst has narrowed down the potential causes to a shortlist of vulnerabilities. Which of the following actions is most effective in determining the actual exploited vulnerability that led to the compromise?
Verifying patch levels and update histories for the affected systems.
Examining the less secure network paths to find the most plausible point of entry.
Analyzing the correlation between exploit signatures and network traffic.
Reviewing public CVE databases for matches with the shortlisted vulnerabilities.